Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in xine-lib
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in xine-lib
ID: MDVSA-2008:178
Distribution: Mandriva
Plattformen: Mandriva 2008.0
Datum: Do, 21. August 2008, 07:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878
Applikationen: Xine

Originalnachricht

This is a multi-part message in MIME format...

------------=_1219297237-11275-8316


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:178
http://www.mandriva.com/security/
_______________________________________________________________________

Package : xine-lib
Date : August 20, 2008
Affected: 2008.0
_______________________________________________________________________

Problem Description:

Alin Rad Pop found an array index vulnerability in the SDP parser
of xine-lib. If a user or automated system were tricked into opening
a malicious RTSP stream, a remote attacker could possibly execute
arbitrary code with the privileges of the user using the program
(CVE-2008-0073).

The ASF demuxer in xine-lib did not properly check the length of
ASF headers. If a user was tricked into opening a crafted ASF file,
a remote attacker could possibly cause a denial of service or execute
arbitrary code with the privileges of the user using the program
(CVE-2008-1110).

The Matroska demuxer in xine-lib did not properly verify frame sizes,
which could possibly lead to the execution of arbitrary code if a
user opened a crafted ASF file (CVE-2008-1161).

Luigi Auriemma found multiple integer overflows in xine-lib. If a
user was tricked into opening a crafted FLV, MOV, RM, MVE, MKV, or
CAK file, a remote attacker could possibly execute arbitrary code
with the privileges of the user using the program (CVE-2008-1482).

Guido Landi found A stack-based buffer overflow in xine-lib
that could allow a remote attacker to cause a denial of service
(crash) and potentially execute arbitrary code via a long NSF title
(CVE-2008-1878).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
6aa7eae08e4878a56216c21d2895d38a
2008.0/i586/libxine1-1.1.8-4.7mdv2008.0.i586.rpm
e7f1553bf63778f25d9fbf730d5b120c
2008.0/i586/libxine-devel-1.1.8-4.7mdv2008.0.i586.rpm
75e68e91207e014f287b93cdd664a073
2008.0/i586/xine-aa-1.1.8-4.7mdv2008.0.i586.rpm
accb9c34f5046451b66142bdd6a21706
2008.0/i586/xine-caca-1.1.8-4.7mdv2008.0.i586.rpm
0e4198ff66564f160945bd8a73932482
2008.0/i586/xine-dxr3-1.1.8-4.7mdv2008.0.i586.rpm
44853bc05ede93786675969cdfd2b009
2008.0/i586/xine-esd-1.1.8-4.7mdv2008.0.i586.rpm
833f7be8ad722fde7dcae24633914556
2008.0/i586/xine-flac-1.1.8-4.7mdv2008.0.i586.rpm
ee032b270eb9bd4a639ed9f011be8965
2008.0/i586/xine-gnomevfs-1.1.8-4.7mdv2008.0.i586.rpm
cc9adb7d0af33e3b8bcc067c6c62d57d
2008.0/i586/xine-image-1.1.8-4.7mdv2008.0.i586.rpm
020e8b3d47d6e1d29fa0ec4d48d6c6fd
2008.0/i586/xine-jack-1.1.8-4.7mdv2008.0.i586.rpm
e927b440649d60abc0ab86dbba263af9
2008.0/i586/xine-plugins-1.1.8-4.7mdv2008.0.i586.rpm
613c9490440b26a3734a447b73bddf67
2008.0/i586/xine-pulse-1.1.8-4.7mdv2008.0.i586.rpm
ca31b8372982abf3ca3736116e91435f
2008.0/i586/xine-sdl-1.1.8-4.7mdv2008.0.i586.rpm
3d7cdb0be5abf9432dcfa6b69decec9c
2008.0/i586/xine-smb-1.1.8-4.7mdv2008.0.i586.rpm
36aea6a4873e1f868ddf08c4d7eefe02
2008.0/SRPMS/xine-lib-1.1.8-4.7mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
1f58d28dfaa98b7eccf058752e41631c
2008.0/x86_64/lib64xine1-1.1.8-4.7mdv2008.0.x86_64.rpm
150013536fe38899fcdad61c704cab5c
2008.0/x86_64/lib64xine-devel-1.1.8-4.7mdv2008.0.x86_64.rpm
67471aea2b6f46ae6850199b85f1bba0
2008.0/x86_64/xine-aa-1.1.8-4.7mdv2008.0.x86_64.rpm
b2178ce163ff3351685f7b94bef06069
2008.0/x86_64/xine-caca-1.1.8-4.7mdv2008.0.x86_64.rpm
fdda01f542e4ecdfd51d2fc695eae8ca
2008.0/x86_64/xine-dxr3-1.1.8-4.7mdv2008.0.x86_64.rpm
03faa97b40b0eb24c5934b1764378324
2008.0/x86_64/xine-esd-1.1.8-4.7mdv2008.0.x86_64.rpm
4af8a886dbbb412b3c3820d354f889f2
2008.0/x86_64/xine-flac-1.1.8-4.7mdv2008.0.x86_64.rpm
ce33c99a46cba4ac745af5d5b4bb399d
2008.0/x86_64/xine-gnomevfs-1.1.8-4.7mdv2008.0.x86_64.rpm
512b93a5a0c602358c911f07dffcdae1
2008.0/x86_64/xine-image-1.1.8-4.7mdv2008.0.x86_64.rpm
6c8233325169f39d9d753abd604a4bcf
2008.0/x86_64/xine-jack-1.1.8-4.7mdv2008.0.x86_64.rpm
5a0afda6905461d13a21ac7fd8b27eee
2008.0/x86_64/xine-plugins-1.1.8-4.7mdv2008.0.x86_64.rpm
66cf6873a4013533e7bb2ef664ae9830
2008.0/x86_64/xine-pulse-1.1.8-4.7mdv2008.0.x86_64.rpm
8166bc1bc60957cabfc2038adf10f4df
2008.0/x86_64/xine-sdl-1.1.8-4.7mdv2008.0.x86_64.rpm
6f5708f3d355a95b307158996d28bfea
2008.0/x86_64/xine-smb-1.1.8-4.7mdv2008.0.x86_64.rpm
36aea6a4873e1f868ddf08c4d7eefe02
2008.0/SRPMS/xine-lib-1.1.8-4.7mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIrNO7mqjQ0CJFipgRAh9LAKDa9dFv2EbViWSeaRMGAgCLvuQgnwCdFaTZ
hdkD/jCzs0mcRZEISstBXwk=
=9Hc3
-----END PGP SIGNATURE-----


------------=_1219297237-11275-8316
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1219297237-11275-8316--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung